Exceptions in Netty
1. Overview In this quick article, we’ll be looking at exception handling in Netty. Simply put, Netty is a framework for building high-performance asynchronous and event-driven network applications....
View ArticleSpring MVC Tutorial
1. Overview and Maven This is a simple Spring MVC tutorial showing how to set up a Spring MVC project, both with Java-based Configuration as well as with XML Configuration. The Maven artifacts for...
View ArticleGetting Started with Java RMI
1. Overview When two JVMs need to communicate, Java RMI is one option we have to make that happen. In this article, we’ll bootstrap a simple example showcasing Java RMI technology. 2. Creating the...
View ArticleSpring Boot Actuator
1. Overview In this article, we’re going to introduce Spring Boot Actuator. We’ll cover the basics first, then discuss in detail what’s available in Spring Boot 1.x vs 2.x. We’ll learn how to use,...
View ArticleThe Trie Data Structure in Java
1. Overview Data structures represent a crucial asset in computer programming, and knowing when and why to use them is very important. This article is a brief introduction to trie (pronounced “try”)...
View ArticleCreating and Configuring Jetty 9 Server in Java
1. Overview In this article, we’ll talk about creating and configuring a Jetty instance programmatically. Jetty is an HTTP server and servlet container designed to be lightweight and easily...
View ArticleSpring 5 and Servlet 4 – The PushBuilder
1. Introduction The Server Push technology — part of HTTP/2 (RFC 7540) — allows us to send resources to the client proactively from the server-side. This is a major change from HTTP/1.X pull-based...
View ArticleAn Example of Load Balancing with Zuul and Eureka
1. Overview In this article, we’ll look at how load balancing works with Zuul and Eureka. We’ll route requests to a REST Service discovered by Spring Cloud Eureka through Zuul Proxy. 2. Initial Setup...
View ArticleSpring Security – Auto Login User After Registration
1. Overview In this quick tutorial, we’ll discuss how to auto-authenticate users immediately after the registration process – in a Spring Security implementation. Simply put, once the user finishes...
View ArticleAn Introduction to Kong
1. Introduction Kong is an open-source API gateway and microservice management layer. Based on Nginx and the lua-nginx-module (specifically OpenResty), Kong’s pluggable architecture makes it flexible...
View ArticleExtra Login Fields with Spring Security
1. Introduction In this article, we’ll implement a custom authentication scenario with Spring Security by adding an extra field to the standard login form. We’re going to focus on 2 different...
View ArticleA Guide to the finalize Method in Java
1. Overview In this tutorial, we’ll focus on a core aspect of the Java language – the finalize method provided by the root Object class. Simply put, this is called before the garbage collection for a...
View ArticleJava Weekly, Issue 213
Here we go… 1. Spring and Java >> Fumigating the IDEA Ultimate code using dataflow analysis [blog.jetbrains.com] A deep dive into the how code inspection in works in IntelliJ. >> Immutable...
View ArticleHow to Manually Authenticate User with Spring Security
1. Overview In this quick article, we’ll focus on how to programmatically set an authenticated user in Spring Security and Spring MVC. 2. Spring Security Simply put, Spring Security hold the principal...
View ArticleIntoduction to Spliterator in Java
1. Overview The Spliterator interface, introduced in Java 8, can be used for traversing and partitioning sequences. It’s a base utility for Streams, especially parallel ones. In this article, we’ll...
View ArticleGeospatial Support in ElasticSearch
1. Introduction Elasticsearch is best known for its full-text search capabilities but it also features full geospatial support. We can find more about setting up Elasticsearch and getting started in...
View ArticleIntroduction to Lettuce – the Java Redis Client
1. Overview This article is an introduction to Lettuce, a Redis Java client. Redis is an in-memory key-value store that can be used as a database, cache or message broker. Data is added, queried,...
View ArticleIntroduction to Javadoc
1. Overview Good API documentation is one of the many factors contributing to the overall success of a software project. Fortunately, all modern versions of the JDK provide the Javadoc tool – for...
View ArticleHTTP Requests with Kotlin and khttp
1. Introduction The HTTP protocol and APIs built on it are of central importance in programming these days. On the JVM we have several available options, from lower-level to very high-level libraries,...
View ArticleGet Log Output in JSON
1. Introduction Most Java logging libraries today offer different layout options for formatting logs – to accurately fit the needs of each project. In this quick article, we want to format and output...
View Article